Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Abstracts
biblio
An information-theoretic security metric for future wireless communication systems
Submitted by aekwall on Thu, 04/08/2021 - 3:41pm
Measurement
quantitative analysis
information theoretic security metric
information theoretic point of view
fine-grained tuning
Abstracts
Random variables
information theoretic security
wireless communication systems
security performance
Security Properties
radio networks
Scalability
Entropy
uncertainty
Metrics
Wireless communication
policy-based governance
pubcrawl
Human behavior
Resiliency
security
telecommunication security
biblio
Privacy Protection Scheme in Smart Grid Using Rechargeable Battery
Submitted by grigby1 on Mon, 03/09/2020 - 1:57pm
Scalability
Metrics
policy-based governance
privacy
privacy protection scheme
pubcrawl
rechargeable battery
resilience
Resiliency
Information Leakage
secondary cells
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
smart power grids
statistical methods
user privacy
electrical power
automation
batteries
battery power information
collaboration
composability
data privacy
Educational institutions
electrical load information
Abstracts
Electronic mail
energy consumption
heuristic algorithm
home energy use information
home network
Human behavior
Human Factors
file
Khalaj_Impact_Analysis.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:33pm
Abstracts
Apr'15
CMU
Computational modeling
Context
Microwave integrated circuits
Runtime
Syntactics
biblio
Impact Analysis based on a Global Hierarchical Object Graph
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:33pm
Abstracts
Apr'15
CMU
Computational modeling
Context
Microwave integrated circuits
Runtime
Syntactics
CMU
Apr'15
biblio
A unified sequential equivalence checking approach to verify high-level functionality and protocol specification implementations in RTL designs
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
high level functionality verification
unified sequential equivalence checking approach
Sequential equivalence checking
sequence of states
RTL design verification
RTL design
Protocols
protocol specification implementation
Integrated circuit modeling
high-level models
high level synthesis
high level reference model
high level model
Abstracts
formal verification
formal technique
Formal Specification
electronic design automation
Educational institutions
design verification
design under verification
Data models
Computational modeling
computational margin
communication protocol
Calculators
biblio
RESEARCH on the future functions and MODALITY of smart grid and its key technologies
Submitted by BrandonB on Tue, 05/05/2015 - 11:08am
geography dimension
wide-area situational awareness technology
smart power grids
Smart Grids
smart grid modality
Smart Grid
Reliability
real-time tracking simulation technology
power network control
power engineering computing
Natural gas
Large-scale energy storage technology
large-capacity flexible transmission technology
key technology
intelligent electricity application technology
Integrated circuit interconnections
Abstracts
function and state
flexible AC transmission systems
Energy storage
energy security
energy resource transmission system
electricity
distributed power generation
development
DC power distribution technology
cloud computing technology
Cloud Computing
big data analysis
Big Data
batteries
biblio
Visualization of Security Metrics for Cyber Situation Awareness
Submitted by BrandonB on Tue, 05/05/2015 - 11:08am
Measurement
visualization
visual analytics technique
SIEM systems
security metric visualization
security information visualization
security information and event management systems
security
Olympic Games scenario
Network Security Status
network security level assessment
Abstracts
Layout
high level metrics visualization
data visualisation
data analysis
cyber situation awareness
computer network security
big data security
Big Data
Availability
biblio
Some issues regarding operating system security
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
Abstracts
android
Android (operating system)
covert channel analysis
Focusing
information security
Laboratories
operating system security
operating systems
secure OS design
security of data
software engineering
Standards development
Windows
biblio
Preventing Client Side XSS with Rewrite Based Dynamic Information Flow
Submitted by BrandonB on Tue, 05/05/2015 - 9:49am
Semantics
JavaScript abstract syntax tree
JavaScript code
JSTFlow
online front-ends
performance overhead
rewrite based dynamic information flow
security
security of data
JavaScript
sensitive information leaks
Syntactics
taint engine
taint model
tainted information flow
web applications
XSS attacks
abstract intermediate representation
Java
internet
information security
information flow tracking framework
information flow analysis
fine-grained isolation
Engines
Data models
data flow analysis
cross-site scripting
code rewrite
client side XSS
Browsers
browser proxy
Abstracts
biblio
The design of the secure transmission and authorization management system based on RBAC
Submitted by BrandonB on Mon, 05/04/2015 - 1:54pm
group authority
SSL protocol
server-side digital certificate
Rose-based access control
RBACt
RBAC model
public key infrastructure
public key cryptography
PKI principles
PKI
MVC model
internet
identity authentication
Abstracts
Electronic government
E-Government
distributed authority management
Digital certificate
data secure transmission
client-side digital certificate
certificate authority system
centralized authority
authorization management system
authorization
authorisation
Aspect-oriented programming
1
2
next ›
last »